Certbot and KeyChest API

Category : https , keychest , security

KeyChest is being integrated with Let’s Encrypt more tightly, it now has its first integration hook for Certbot. It registers domains using self-registered API keys and creates dormant accounts for you simply to confirm.

“Read More”

How Big is Let’s Encrypt

Category : security

I have looked into this some time ago, when I researched the global market of web encryption. I used market research reports and arrived to the number of 80%. This time, I had a look at the data from KeyChest monitoring.

“Read More”

Safe Web Security – can it crowdfund?

Tags :

Category : security

I wanted to try it for a while – a crowdfunding campaign. The most important challenge for me was to write a story that would be easy to understand and sufficiently interesting for people investing in crowd funding projects.

“Read More”

Intruder – Automated Pen Testing for SMEs

I met Chris Wallis last week for a cuppa and to talk shop as we both have been doing start-ups for a while. He’s ahead of me and it’s incredible he pulled it off.

“Read More”

Dash cashless – design and operation (HTTPS)

Category : https , security

I recently attended a workshop about app/web product design. The presenter asked us to think of a well and badly designed app. Dash sprang to my mind as an example of the latter. While its design is an ongoing issue, it happened at least once that its server certificate expired and users couldn’t do payments.

“Read More”

KeyChest – Getting Rid of Broken Padlocks

We all have seen it – I go to visit an interesting blog, DEFCON website, or pay for your parking on the go. But I can’t – the website or web service has an expired certificate and the “damn security wouldn’t let me do it”.

“Read More”

Estonia Hits Gemalto Again – Insecure eID cards

Category : security

When we researched impacts of the ROCA vulnerability, the Estonian government limited the impact with a cut-off date. ROCA only applied after that date. It now appears that Gemalto had another problem before that cut-off date.

“Read More”

Encryption and Databases Are Actually Similar

We have been building encryption service for a while. I grew up in the world of encryption and many things just came with experience, without being spelled out. Here’s another why I believe in “hardware encryption”.

“Read More”

JSignPdf Now Supports Remote Signing

Category : key management , security

A great news – our CloudFoxy is now supported by JSignPdf 1.6.4. You can now sign PDF with eIDAS compliant smart-cards (or OpenPGP dongles) – zero drivers or configuration on user computers.

“Read More”

Growth Of HTTPS Public Logs (CT)

Category : https , keychest , security

As we have a database of all the issued public certificates, we started looking at some of the data. This is a quick note about the frequency of updates of certificate transparency (CT) logs.

“Read More”